Continuous Authentication Using Mouse Clickstream Data Analysis

Sultan Almalki,Prosenjit Chatterjee,Kaushik Roy
2023-11-24
Abstract:Biometrics is used to authenticate an individual based on physiological or behavioral traits. Mouse dynamics is an example of a behavioral biometric that can be used to perform continuous authentication as protection against security breaches. Recent research on mouse dynamics has shown promising results in identifying users; however, it has not yet reached an acceptable level of accuracy. In this paper, an empirical evaluation of different classification techniques is conducted on a mouse dynamics dataset, the Balabit Mouse Challenge dataset. User identification is carried out using three mouse actions: mouse move, point and click, and drag and drop. Verification and authentication methods are conducted using three machine-learning classifiers: the Decision Tree classifier, the K-Nearest Neighbors classifier, and the Random Forest classifier. The results show that the three classifiers can distinguish between a genuine user and an impostor with a relatively high degree of accuracy. In the verification mode, all the classifiers achieve a perfect accuracy of 100%. In authentication mode, all three classifiers achieved the highest accuracy (ACC) and Area Under Curve (AUC) from scenario B using the point and click action data: (Decision Tree ACC:87.6%, AUC:90.3%), (K-Nearest Neighbors ACC:99.3%, AUC:99.9%), and (Random Forest ACC:89.9%, AUC:92.5%).
Signal Processing,Artificial Intelligence,Cryptography and Security,Machine Learning
What problem does this paper attempt to address?
### Problems the Paper Attempts to Solve This paper aims to enhance system security by analyzing mouse clickstream data for continuous authentication. Specifically, the paper focuses on the following aspects: 1. **Continuous Authentication**: Compared to traditional one-time static authentication based on physiological characteristics, continuous authentication using user behavior characteristics (such as mouse operations) can better prevent security vulnerabilities. 2. **Behavioral Biometrics**: Using mouse dynamics as a form of behavioral biometrics to distinguish between legitimate and illegitimate users while they are using the computer. 3. **Classification Algorithm Evaluation**: An empirical evaluation of three different machine learning classifiers (Decision Tree, K-Nearest Neighbors, Random Forest) to verify their performance in continuous authentication. ### Main Findings - During the validation phase, all classifiers achieved 100% accuracy. - During the authentication phase, under point and click action data, each classifier achieved high accuracy and Area Under the Curve (AUC): - Decision Tree: Accuracy 87.6%, AUC 90.3% - K-Nearest Neighbors: Accuracy 99.3%, AUC 99.9% - Random Forest: Accuracy 89.9%, AUC 92.5% ### Conclusion The experiments demonstrate that using mouse dynamics data for continuous authentication is feasible and effective, with the K-Nearest Neighbors classifier performing exceptionally well in this task. This provides new ideas and technical means for further enhancing system security.